IRJET- Identifying Information Relocate with Reliable Estimation and Securing Data on Cloud Computin

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 07 Issue: 03 | Mar 2020

p-ISSN: 2395-0072

www.irjet.net

IDENTIFYING INFORMATION RELOCATE WITH RELIABLE ESTIMATION AND SECURING DATA ON CLOUD COMPUTING ISWARYA G M1, KAAVYA SHREE M A2, KEERTHANA K3 1,2,3Computer

science and Engineering, Kingston Engineering College, Vellore, India. ---------------------------------------------------------------------***---------------------------------------------------------------------Abstract— The cloud data services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. Unfortunately, the integrity of cloud data is subject to skepticism due to the existence of hardware/software failures and human errors. Several mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. Public auditing on the integrity of shared data with these existing mechanisms will inevitably reveal confidential information. Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, we consider the task of allowing a threshold proxy re - encryption, on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. While prior works on ensuring remote data integrity often lacks the support of either public Audit ability or dynamic data operations, this paper achieves both. Keywords— Block chain technique, secure erasure code, AES, checksum algorithm. 1. INTRODUCTION Distributed computing has been envisioned as the accompanying creation information development plan for endeavors, due to its broad summary of unparalleled inclinations in the IT history: on-ask for self-advantage, inescapable framework get to, zone self-choosing resource pooling, quick resource adaptability, use based assessing and transference of peril. As an aggravating development with huge consequences, distributed computing is changing the specific method for how associations use information advancement. One fundamental piece of this standpoint changing is that data are being united or outsourced to the. From customers' view, including together individuals and IT tries, securing data remotely to the in a versatile on-ask for strategy bring engaging focal points: landing of the weight for storage space organization, vast data access with put self-sufficiency, and avoidance of advantages costs on hardware, programming, and staff frameworks of help, etcetera. While distributed computing make these compensation more captivating than some other time in ongoing memory, it also passes on new and testing security risks to customers' outsourced data. As organization providers (CSP) are part administrative components, data outsourcing is truly surrendering customer's last control more than the fate of their data. As an issue of first significance, in spite of the way that the structures underneath the are altogether more powerful and trustworthy than individual enlisting devices, they are still before the broad assortment of both inside and outside risks for data respectability. 2. RELATED WORKS REFERENCES

FEATURES

DRAWBACKS

Zhen Liu, Zhenfu Cao, and Duncan S. Traceable cipher text policy attribute Decryption keys of multiple users are Wong based encryption not (T-CP-ABE). linked to user’s identification details. Jinguang Han, Willy Susilo, Yi Mu , Privacy-preserving decentralized CP- Attributes can reveal user identities. Jianying Zhou, and Man Ho Au ABE (PPDCPABE). Jianting Ning, Xiaolei Dong, Zhenfu Cao, Ciphertext-policy attribute-based User must share data in expressive way. Lifei Wei, and Xiaodong Lin encryption (CP-ABE) enables fine-grained access control. Jiguo Li, Wei Yao, Yichen Zhang, Huiling ciphertext policy attribute based Revocation of a user affects another. Qian and Jinguang Han encryption (CP-ABE) scheme with efficient user revocation.

© 2020, IRJET

|

Impact Factor value: 7.34

|

ISO 9001:2008 Certified Journal

|

Page 809


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.